METHOD FOR PROVIDING A USER WITH AN AUTHENTICATED REMOTE ACCESS TO A REMOTE SECURE DEVICE

Information

  • Patent Application
  • 20130247163
  • Publication Number
    20130247163
  • Date Filed
    November 18, 2011
    12 years ago
  • Date Published
    September 19, 2013
    11 years ago
Abstract
The invention relates to a method for providing a user with an authenticated remote access to a remote secure device (2), said remote access being initiated from a local accessing device (1), said remote secure device (2) embedding secure data related to a specific service, characterized in that it comprises establishing a mutual authentication between said remote secure device (2) and a local secure device (3) different from the local accessing device (1) so as the user of the local accessing device (3) is able to access to the secure data of the remote secure device (2).
Description
FIELD OF THE INVENTION

The present invention relates generally to secure devices, and more particularly to a method for keeping the benefits of two factor authentication when using a remotely accessible secure device.


BACKGROUND OF THE INVENTION

Secure devices have been used for years in applications presenting the need for strong security. The exponential growth of the internet has also had the unfortunate side effect of speeding up the dissemination of malware and facilitating access to malware creation techniques. New threats such as spyware have emerged during last decade, making feasible attacks based upon spying the communications between a host and a smart card, and making necessary to adapt the way secure devices are being used.


A traditional architecture for the use of secure devices involves a local connection of those appliances to a host computer. This computer may be a handset, a PC, an ATM machine, or any other type of device. The concept generally used is one secure device connected to one host computer to secure access to a specific service or application from that host computer. An application is typically executed on the host computer which communicates with the secure device, usually by means of APDU commands whenever needed.


The need for a local connection between the secure device and the host computer sometimes creates a problem by limiting the range of devices usable for an application. This problem can go as far as preventing the deployment of application involving smart devices due to the lack of equipment supporting their use.


For example, in the field of secure IPTV devices, on the one hand secure devices are suitable for content ciphering/deciphering, but on the other hand, there is an emergence and a growth of a nomadicity constraints requiring access to the premium TV content any time, anywhere, from any device (PC, Mobile, TV, gamestation . . . ). The multiplication of the form factor of viewing devices makes a lot more difficult the large scale deployment of secure devices for content decryption.


Secure devices offer an attractive value proposition by providing secure data storage, opaque code execution and true random number generation capabilities. The use of secure device usually results in higher security level to protect application data and access to services, primarily because secure devices enable the use of two (and sometimes more) authentication factors: (What You know and What you have).


Up to now applications involving secure devices typically involved a physical connection of the secure device to some host computer (PC, Handset, ATM . . . ) used to access the protected service. Physical presence of the secure device is usually required to validate a credential (such as a pin code) in order to guarantee two factors authentication.


Currently there are emerging applications using secure devices as network entities exposing security services accessible remotely. In this use, there is no a physical local presence of the secure device, hence, the meaning of the “what you have” authentication factor becomes unclear.


It is then an object of the invention to provide a method for preserving the benefits of two factors authentication when using remotely located secure element by using two secure devices working in collaboration. One of them, containing the data or secrets tied to a specific service is remotely located while the other one is “in the hands of the user” . . . The invention aims to provide a method for secure devices not physically “in the hand” of the user.


Thereto, the present invention provides a method for providing a user with an authenticated remote access to a remote secure device, said remote access being initiated from a local accessing device, said remote secure device embedding secure data related to a specific service, characterized in that it comprises establishing a mutual authentication between said remote secure device and a local secure device different from the local accessing device so as the user of the local accessing device is able to access to the secure data of the remote secure device.


According to one aspect of the invention,

    • the method may comprise establishing a secure communication channel between the local accessing device and the remote secure device so as to provide a one way authentication, said local accessing device authenticating the remote secure device;
    • the remote secure device may contact the local secure device using the SIP protocol;
    • the method may comprise using a peer application in the remote secure device and a peer application in the local secure device so as the two peer applications negotiate the setup of a data session between the remote secure device and the local secure device
    • the remote secure device may provide a user interface on the local accessing device after the setup of said data session between the remote secure device and the local secure device;
    • the method may comprise capturing a PIN code entered by the user and sending back said PIN code to the remote secure device for verification;
    • the remote secure device may grant access to its secure data to the local accessing device after checking the entered PIN code;
    • the method may comprise using a storage area network as remote secure device;
    • the method may comprise using laptop PC as local accessing device.


Thanks to the invention, the second secure device, such as a UICC inserted in the user handset, captures a physical interaction to insure two factors authentication.


The invention advantageously provides an application involving remote authenticated access to a secure storage area network from an “anonymous PC”.


According to the invention, a functionality of the security application is shared between two distinct secure devices: a remote and a local one. The remote secure device can advantageously contain data and security elements directly related to the service or application, while the local one can take care of the user interaction.





The various aspects, features and advantages of the invention will become more fully apparent to those having ordinary skill in the art upon careful consideration of the following Detailed Description, given by way of example thereof, with the accompanying drawings described below:



FIG. 1 schematically shows an architecture of a remote access to a remote secure device such as a Storage Area Network device (SAN) holding confidential data according to an embodiment of the invention.





DETAILED DESCRIPTION

The present invention may be understood according to the detailed description provided herein.


Shown in FIG. 1 are a local accessing device such as an anonymous PC 1 which does not necessarily embed a secure element, a remote secure device 2 such as a Storage Area Network device (SAN) and a local secure device 3 such as an UICC inserted in a user's handset 4.


The SAN 2 embeds a secure device 21 able to perform on the fly in and out data encryption.


In this method for providing a user an authenticated remote access to the remote secure device 2 from the local accessing device 1, which is not necessarily a secured device, the local secure device 3 and the remote secure device 2 both hold secrets and mutually authenticate to each other.


For doing so, the SAN 2 exposes a secure interface accessible via the HTTPS protocol on the local accessing device 1. The user for example uses the window explorer to browse remote data stored in the remote secure device 2. This method provides a convenient access to the remote storage, completely integrated with the windows interface. It will be well understood that other interfaces can be used such as browser based HTTPS based interface, etc . . .


The user for example enters in the windows explorer the HTTPS address of the remote secure device 2. The method comprises establishing a secure link or protected tunnel 12 between the explorer of the local device 1 and the remote secure device 120 involving one way authentication relying on a signed server certificate presented by the remote secure device 2. The tunnel 120 is one way authenticated as the local device 1 does not have strong credentials to perform a mutual authentication with the remote secure device 2.


The SAN 2 requires robust user authentication before authorizing access to the data in its custody. In order to perform the user authentication, the SAN 2 contacts the UICC 3 using the SIP protocol for example using a peer application in the SAN 2 and in the UICC 3, such as IMS applications registered to an IMS network. They may also be Simple SIP user agents. The two peer applications negotiate the setup of an MSRP session between them. The MSRP session is a data session established between two peers application following a SIP session negotiation. The MSRP link provides a bidirectional data link between the two peer applications. One byte inserted at one end of the pipe by one peer application is received by the other peer application. The MSRP link is secured from end to end and involves a mutual authentication between the two secure devices 2, 3.


In another embodiment, the SIP address at which the SAN 2 contacts the user's UICC may have been defined when setting up the SAN.


Thanks to the secure MSRP link, the SAN 2 transfers a user interface involving the capture of a pin code. In one embodiment, a SIM toolkit commands may be used for describing this user interface. It will be well understood, that it is not a limited example, and if the handset 4 supports for example the smart card web server, HTML based or flash based or any rich media format may be used to carry the interface description.


The UICC application on the handset displays the interface to the user on the handset 4, captures the PIN code entered by the user and sends it back to the SAN 2 for verification.


The remote secure device 2 then checks the PIN code and grants access to its content to the local device 1 user. (the user of the PC may then advantageously different from the user of the UICC)


In another embodiment a mobile network operator, owning the UICC can offer to third party service providers remote user interface display services. The third party service provider deploys a secure device application using a networked secure device to avoid connectivity issues and is able to deploy the service on a wide range of user appliances. The remote secure device 2 is an ADSL box 2. IPTV service security elements are stored on the remote secure device 2, while the MNO builds a generic and general purpose remote User interface application usable by many service providers.


As previously described above, the user authentication is done from the PC using the web interface and user name and password, which has the advantage of minimizing the requirements on the accessing PC.


The use of an anonymous PC as local accessing device 1 advantageously minimizes the requirements on client devices and offers enhanced security.


Thanks to this method, once the remote secure device 2 and the local secure device 1 have established a mutually authenticated secure connection, the user is therefore confident that the interface displayed on the handset 4 indeed originates from the remote secure device 2.


It will be well understood that the local secure device (3) may be a UICC able to be inserted in a handset (4) is a not limited example. The local secure device (3) may be a secure memory card inside the handset, or an embedded secure element inside the handset.


When the secure device is remote, the physical interaction may disappear, resulting in the loss of the “what you have” factor which is often used as the “second authentication factor”. This method advantageously provides a solution to preserve the second authentication factor linked to “what you have” . . . This solution providing two secure devices working in tandem, one carrying security elements related to a specific service, and the other “in the hands of the user”, requiring the user physical interaction, allows to protect the second authentication factor “what you have”.

Claims
  • 1. A method for providing a user with an authenticated remote access to a remote secure device (2), said remote access being initiated from a local accessing device (1), said remote secure device (2) embedding secure data related to a specific service, the method comprising establishing a mutual authentication between said remote secure device (2) and a local secure device (3) different from the local accessing device (1) so as the user of the local accessing device (3) is able to access to the secure data of the remote secure device (2).
  • 2. The method according to claim 1, further comprising establishing a secure communication channel (120) between the local accessing device (1) and the remote secure device (2) so as to provide a one way authentication, said local accessing (1) device authenticating the remote secure device (2)
  • 3. The method according to one of the previous claims, wherein the remote secure device (2) contacts the local secure device (3) using the SIP protocol.
  • 4. The method according to claim 2, comprising using a peer application in the remote secure device (2) and a peer application in the local secure device (3) so as the two peer applications negotiate the setup of a data session between the remote secure device (2) and the local secure device (3).
  • 5. The method according to claim 4, wherein the remote secure device (2) provides a user interface on the local accessing device (1) after the setup of said data session between the remote secure device (2) and the local secure device (3).
  • 6. The method according to claim 5, further capturing a PIN code entered by the user and sending back said PIN code to the remote secure device (2) for verification.
  • 7. The method according to claim 6, wherein the remote secure device (2) grants access to its secure data of the remote secure device (2) to the local accessing device (1) after checking the entered PIN code.
  • 8. The method according to claim 1 or claim 2, wherein a storage area network is used as remote secure device (2).
  • 9. The method according to claim 1 or claim 2, wherein a laptop PC is used as local accessing device (3).
  • 10. The method according to claim 3, comprising using a peer application in the remote secure device (2) and a peer application in the local secure device (3) so as the two peer applications negotiate the setup of a data session between the remote secure device (2) and the local secure device (3).
  • 11. The method according to claim 3, wherein a storage area network is used as remote secure device (2).
  • 12. The method according to claim 4, wherein a storage area network is used as remote secure device (2).
  • 13. The method according to claim 3, wherein a laptop PC is used as local accessing device (3).
  • 14. The method according to claim 4, wherein a laptop PC is used as local accessing device (3).
Priority Claims (1)
Number Date Country Kind
10306320.2 Nov 2010 EP regional
PCT Information
Filing Document Filing Date Country Kind 371c Date
PCT/EP2011/070498 11/18/2011 WO 00 5/30/2013